similar to: POSIX ACL to NT ACL bugs in get_nt_acl()

Displaying 20 results from an estimated 600 matches similar to: "POSIX ACL to NT ACL bugs in get_nt_acl()"

2003 Mar 06
1
ACL bug FIXes for get_nt_acl()
Two attached patches for samba 2.2.7a and 3.0-alfa22, that I've made today, fix 3 bugs mentioned in my previous e-mail. 1) For each file in addition to ALLOW ACE proper DENY ACE is created. 2) "Take ownership" is shown DENIED for all except root ACEs 3) Read Permissions and read attributes are always shown as allowed, as they are actually allowed. -- Zhitomirsky
2003 Mar 03
1
POSIX to NT ACL bug
Hello recently I set up XFS share under samba , and played from Win2K with ACL entries of shared files, and noticed that Win2K never DENY ACL entries , so for example for a XFS file with acl: # owner: a user::r-- group::rwx other::rwx Win2K security tab shows for user "a": Read & exec = <nothing here> Read = Allowed Write = <nothing
2011 Feb 17
0
deriving waveform values
Im am curerntly trying to use R software to extract uncompressed waveform values with I have acquired from IDLreadGLAS tool. I am very lost with this & know I have to assess the GLA01 product data, however, any advice on the matter atall would be brilliant, particularly on define thresholds and connecting GLA01 and GLA14 data (or any data for that matter) -- View this message in context:
2013 Feb 03
0
[LLVMdev] [Polly]
Dear all, Yesterday, from the customer's code I observed relatively simple case, where Polly is unable to detect parallelizable outer loop. Consider two versions of Fortran routine: 1) subroutine filter(H, szh, X, szx, Y, szy) implicit none integer(kind=IKIND), intent(in) :: szh, szx, szy real(kind=RKIND), intent(in) :: H(szh), X(szx) real(kind=RKIND), intent(out) :: Y(szy)
2002 Jun 06
4
Linux and Printing via smbprint
Hi there Looking at the archives I didn't find a solution to the following problem we have here: Printing from our linux-server (wagner) to an intel printserver (PS652D8F) doesn't work. Here's the stuff we know/tried: wagner:~ # smbclient -L //PS652D8F -N added interface ip=10.0.0.10 bcast=10.0.0.255 nmask=255.255.255.0 Got a positive name query response from 10.0.0.40 ( 10.0.0.40
2013 Feb 03
2
[LLVMdev] [Polly] Parallelizing outer loop containing inner reduction loop
Oops, sorry for the message title, making it more descriptive now... 2013/2/3 Dmitry Mikushin <dmitry at kernelgen.org> > Dear all, > > Yesterday, from the customer's code I observed relatively simple case, > where Polly is unable to detect parallelizable outer loop. Consider two > versions of Fortran routine: > > 1) > > subroutine filter(H, szh, X, szx, Y,
2015 Feb 02
0
NT_STATUS_ACCESS_DENIED (I can write and read, but not replace)
I need help interpeting this issue, thanks in advance. A file was created by user nli on windows 7, that user can manipulate the file at will. If user jpyeron tries to manipulate the file on XPx64 the below happens. # smbd -V Version 3.0.33-3.40.el5_10 [2015/02/02 18:34:15, 8] smbd/dosmode.c:dos_mode_from_sbuf(188) dos_mode_from_sbuf returning [2015/02/02 18:34:15, 8]
2005 Jul 16
1
Shares all empty after upgrade to 3.0.14a-fc4
Hi, Hoping you can help. I've updated my samba server (PDC) from 3.0.10 to 3.0.14a as part of updating from FC3 to FC4. I now find I cant see inside any of the shares, even though I can see the share names themselves and the directories are quite readable to Linux processes. So, e.g. I can see that I have a share "Users", but not the contents of it. With one exception all shares
2017 Mar 20
4
Skip ACL checks
On Fri, Mar 17, 2017 at 1:54 PM, Volker Lendecke <vl at samba.org> wrote: > On Thu, Mar 16, 2017 at 05:38:57PM +0100, Christoph Kleineweber wrote: > > I am wondering if there is a way to bypass Samba's ACL checks and > delegate > > access control completely to the underlying file system. > > > > My problem arises from the following scenario: Our file system
2006 Jan 31
0
Samba 3 and german umlaute in filenames/ can not delete or rename files or dirs
Hello, i habe an Sama 3 Server with some shares. If I access these shares from Windows and if I generate new files or dirs with german umlaute everythink is OK. I can open theses files and I can open the directory. If I want do delete or rename the files or dirs with german umlaute I got an error message. "I can not read the file from source". creating new dirptr 256 for path
2017 Mar 16
2
Skip ACL checks
Hi all, I am wondering if there is a way to bypass Samba's ACL checks and delegate access control completely to the underlying file system. My problem arises from the following scenario: Our file system implements ACLs that are to the best of my knowledge currently not readable by any of the existing VFS modules. When trying to access a file with an ACL going beyond the file's POSIX
2004 May 19
2
POSIX to ts and back to POSIX
I am trying to use POSIX datetime objects rather than chron datetime objects but am having difficulty with POSIX in a time series. My question: Once a POSIXct vector is bound to a time series, is there a function to convert back to POSIXct? The following code demonstrates what I am trying to do. > ts(as.POSIXct(strptime(tmp,"%m/%d/%Y %H:%M:%S")),freq=1440) Time Series: Start =
2007 Jan 29
5
ACLs fail in 3.0.23d
Whenever I try to read or modify ACLs from my Windows 2000 PDC, my Samba Domain Member Server (Security = ADS) does not allow setting ACLs, nor does it display the existing ACLs. - I have setup ACLs in my Kernel - I have translated and installed libacl and libattr - I can see and modify ACLs with getfacl and setfacl. - I have translated Samba 3.0.23d with --with-acl-support=yes - I have enabled
2004 Sep 20
0
Samba Errors
Hi All, Could anyone please shed some light on the below too errors (and how to fix them). The first one seems the more serious Error 1 p 21 07:40:48 server smbd[8528]: [2004/09/21 07:40:48, 0] lib/util_sock.c:write_socket(412) Sep 21 07:40:48 server smbd[8528]: write_socket: Error writing 5 bytes to socket 16: ERRNO = Connection reset by peer Sep 21 07:40:48 server smbd[8528]: [2004/09/21
2006 Mar 02
0
Making SwitchTower work with csh (and other non-posix shells)
I tried using ST, but it didn''t work with the csh shell. Today I decided to make it work, and came up with the very simple solution of wrapping the failed commands inside a bash instance. Blog post is http://www.flpr.org/articles/2006/03/02/make-switchtower-work-with-csh-hack Solution (so you don''t have to read the blog post :) is to edit
2007 May 11
1
POSIX ACLs
Is anyone looking at supporting the POSIX extended ACLs? Thanks! Trevor
2009 Nov 03
0
posix user mapped to window users without idmap ?
Dear all I am using samba+ldap as PDC , now i want a create a BDC that takes over domain logon process process when PDC become down by taking users/groups information from slave ldap server . My shares are present on disk which is accessible both by PDC and BDC and permission given to POSIX uesrs and group which i think internally mapped to samba users/groups. Now since ldap storing posix
2004 Feb 18
1
Shared posix account for machine trust
I think that machine trust account did not access any resources, is there any way to avoid using posix account for machine trust? or at least using only one shared posix id? --beast
2008 Mar 20
1
pthread_mutexattr_settype non-conformance to man-page and POSIX
I hit a bug in libthr with pthread_mutexattr_settype which (at least as far as I understand the POSIX reference and also the man-page) makes it non-conformant to the specifications. Quoting: """ RETURN VALUES If successful, these functions return 0. Otherwise, an error number is returned to indicate the error. ... ERRORS ... The pthread_mutexattr_settype()
2007 Nov 27
0
Default POSIX ACLs masking later permission edits
Hello, I have recently set up a Samba based file server running 3.0.27a. This file server is part of a Windows 2003 domain, with ACL and extended attribute support enabled, and appears to be functioning properly except for one critical issue with the ACLs. When I try to edit the permissions of a file through Windows, the default POSIX ACL that I set up on the filesystem seems to be masking off